Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
Yu Yinhui [1 ]
Zhang Lei [1 ]
机构
[1] College of Communication Engineering, Jilin University
关键词
mutual authentication protocol; provable security method; Hash function; RFID system;
D O I
暂无
中图分类号
TP391.44 [];
学科分类号
0811 ; 081101 ; 081104 ; 1405 ;
摘要
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [21] Internet of things encryption technology combining elliptic curve cryptosystem, hash function, and RFID-based authentication
    Bin Zheng
    Discover Internet of Things, 5 (1):
  • [22] SKINNY-Based RFID Lightweight Authentication Protocol
    Xiao, Liang
    Xu, He
    Zhu, Feng
    Wang, Ruchuan
    Li, Peng
    SENSORS, 2020, 20 (05)
  • [23] Security analysis and enhancement of One-Way Hash based Low-Cost Authentication Protocol (OHLCAP)
    Ha, JeaCheol
    Moon, SangJae
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 574 - +
  • [24] A Mutual Authentication Protocol for RFID
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-hao
    IT PROFESSIONAL, 2011, 13 (02) : 20 - 24
  • [25] A chaos-based cryptographic hash function for message authentication
    Kwok, HS
    Tang, NS
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (12): : 4043 - 4050
  • [26] ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT Based on U-quark Hash Function
    Jebrane J.
    Lazaar S.
    Recent Advances in Computer Science and Communications, 2024, 17 (02) : 78 - 87
  • [27] MDS Code Based Ultralightweight Authentication Protocol for RFID System
    Maurya, Pramod Kumar
    Ghosh, Haradhan
    Bagchi, Satya
    IEEE ACCESS, 2023, 11 : 10563 - 10577
  • [28] Cyclic group based mutual authentication protocol for RFID system
    Maurya, Pramod Kumar
    Bagchi, Satya
    WIRELESS NETWORKS, 2020, 26 (02) : 1005 - 1015
  • [29] Cyclic group based mutual authentication protocol for RFID system
    Pramod Kumar Maurya
    Satya Bagchi
    Wireless Networks, 2020, 26 : 1005 - 1015
  • [30] A Coding Theory Based Ultralightweight RFID Authentication Protocol with CRC
    Pramod Kumar Maurya
    Joydeb Pal
    Satya Bagchi
    Wireless Personal Communications, 2017, 97 : 967 - 976